emqx_on_prem.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. package mq
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "fmt"
  6. "io"
  7. "net/http"
  8. "strings"
  9. "github.com/gravitl/netmaker/servercfg"
  10. )
  11. type EmqxOnPrem struct {
  12. URL string
  13. UserName string
  14. Password string
  15. }
  16. const already_exists = "ALREADY_EXISTS"
  17. type (
  18. emqxUser struct {
  19. UserID string `json:"user_id"`
  20. Password string `json:"password"`
  21. Admin bool `json:"is_superuser"`
  22. }
  23. emqxLogin struct {
  24. Username string `json:"username"`
  25. Password string `json:"password"`
  26. }
  27. emqxLoginResponse struct {
  28. License struct {
  29. Edition string `json:"edition"`
  30. } `json:"license"`
  31. Token string `json:"token"`
  32. Version string `json:"version"`
  33. }
  34. aclRule struct {
  35. Topic string `json:"topic"`
  36. Permission string `json:"permission"`
  37. Action string `json:"action"`
  38. }
  39. aclObject struct {
  40. Rules []aclRule `json:"rules"`
  41. Username string `json:"username,omitempty"`
  42. }
  43. )
  44. func getEmqxAuthToken() (string, error) {
  45. payload, err := json.Marshal(&emqxLogin{
  46. Username: servercfg.GetMqUserName(),
  47. Password: servercfg.GetMqPassword(),
  48. })
  49. if err != nil {
  50. return "", err
  51. }
  52. resp, err := http.Post(servercfg.GetEmqxRestEndpoint()+"/api/v5/login", "application/json", bytes.NewReader(payload))
  53. if err != nil {
  54. return "", err
  55. }
  56. defer resp.Body.Close()
  57. msg, err := io.ReadAll(resp.Body)
  58. if err != nil {
  59. return "", err
  60. }
  61. if resp.StatusCode != http.StatusOK {
  62. return "", fmt.Errorf("error during EMQX login %v", string(msg))
  63. }
  64. var loginResp emqxLoginResponse
  65. if err := json.Unmarshal(msg, &loginResp); err != nil {
  66. return "", err
  67. }
  68. return loginResp.Token, nil
  69. }
  70. func (e *EmqxOnPrem) GetType() servercfg.Emqxdeploy { return servercfg.EmqxOnPremDeploy }
  71. // CreateEmqxUser - creates an EMQX user
  72. func (e *EmqxOnPrem) CreateEmqxUser(username, password string) error {
  73. token, err := getEmqxAuthToken()
  74. if err != nil {
  75. return err
  76. }
  77. payload, err := json.Marshal(&emqxUser{
  78. UserID: username,
  79. Password: password,
  80. })
  81. if err != nil {
  82. return err
  83. }
  84. req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users", bytes.NewReader(payload))
  85. if err != nil {
  86. return err
  87. }
  88. req.Header.Add("content-type", "application/json")
  89. req.Header.Add("authorization", "Bearer "+token)
  90. resp, err := (&http.Client{}).Do(req)
  91. if err != nil {
  92. return err
  93. }
  94. defer resp.Body.Close()
  95. if resp.StatusCode >= 300 {
  96. msg, err := io.ReadAll(resp.Body)
  97. if err != nil {
  98. return err
  99. }
  100. if !strings.Contains(string(msg), already_exists) {
  101. return fmt.Errorf("error creating EMQX user %v", string(msg))
  102. }
  103. }
  104. return nil
  105. }
  106. func (e *EmqxOnPrem) CreateEmqxUserforServer() error {
  107. token, err := getEmqxAuthToken()
  108. if err != nil {
  109. return err
  110. }
  111. payload, err := json.Marshal(&emqxUser{
  112. UserID: servercfg.GetMqUserName(),
  113. Password: servercfg.GetMqPassword(),
  114. Admin: true,
  115. })
  116. if err != nil {
  117. return err
  118. }
  119. req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users", bytes.NewReader(payload))
  120. if err != nil {
  121. return err
  122. }
  123. req.Header.Add("content-type", "application/json")
  124. req.Header.Add("authorization", "Bearer "+token)
  125. resp, err := (&http.Client{}).Do(req)
  126. if err != nil {
  127. return err
  128. }
  129. defer resp.Body.Close()
  130. if resp.StatusCode >= 300 {
  131. msg, err := io.ReadAll(resp.Body)
  132. if err != nil {
  133. return err
  134. }
  135. if !strings.Contains(string(msg), already_exists) {
  136. return fmt.Errorf("error creating EMQX user %v", string(msg))
  137. }
  138. }
  139. return nil
  140. }
  141. // DeleteEmqxUser - deletes an EMQX user
  142. func (e *EmqxOnPrem) DeleteEmqxUser(username string) error {
  143. token, err := getEmqxAuthToken()
  144. if err != nil {
  145. return err
  146. }
  147. req, err := http.NewRequest(http.MethodDelete, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users/"+username, nil)
  148. if err != nil {
  149. return err
  150. }
  151. req.Header.Add("authorization", "Bearer "+token)
  152. resp, err := (&http.Client{}).Do(req)
  153. if err != nil {
  154. return err
  155. }
  156. defer resp.Body.Close()
  157. if resp.StatusCode >= 300 {
  158. msg, err := io.ReadAll(resp.Body)
  159. if err != nil {
  160. return err
  161. }
  162. return fmt.Errorf("error deleting EMQX user %v", string(msg))
  163. }
  164. return nil
  165. }
  166. // CreateEmqxDefaultAuthenticator - creates a default authenticator based on password and using EMQX's built in database as storage
  167. func (e *EmqxOnPrem) CreateEmqxDefaultAuthenticator() error {
  168. token, err := getEmqxAuthToken()
  169. if err != nil {
  170. return err
  171. }
  172. payload, err := json.Marshal(&struct {
  173. Mechanism string `json:"mechanism"`
  174. Backend string `json:"backend"`
  175. UserIDType string `json:"user_id_type"`
  176. }{Mechanism: "password_based", Backend: "built_in_database", UserIDType: "username"})
  177. if err != nil {
  178. return err
  179. }
  180. req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication", bytes.NewReader(payload))
  181. if err != nil {
  182. return err
  183. }
  184. req.Header.Add("content-type", "application/json")
  185. req.Header.Add("authorization", "Bearer "+token)
  186. resp, err := (&http.Client{}).Do(req)
  187. if err != nil {
  188. return err
  189. }
  190. defer resp.Body.Close()
  191. if resp.StatusCode != http.StatusOK {
  192. msg, err := io.ReadAll(resp.Body)
  193. if err != nil {
  194. return err
  195. }
  196. if !strings.ContainsAny(string(msg), "ALREADY_EXISTS") {
  197. return fmt.Errorf("error creating default EMQX authenticator %v", string(msg))
  198. }
  199. }
  200. return nil
  201. }
  202. // CreateEmqxDefaultAuthorizer - creates a default ACL authorization mechanism based on the built in database
  203. func (e *EmqxOnPrem) CreateEmqxDefaultAuthorizer() error {
  204. token, err := getEmqxAuthToken()
  205. if err != nil {
  206. return err
  207. }
  208. payload, err := json.Marshal(&struct {
  209. Enable bool `json:"enable"`
  210. Type string `json:"type"`
  211. }{Enable: true, Type: "built_in_database"})
  212. if err != nil {
  213. return err
  214. }
  215. req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authorization/sources", bytes.NewReader(payload))
  216. if err != nil {
  217. return err
  218. }
  219. req.Header.Add("content-type", "application/json")
  220. req.Header.Add("authorization", "Bearer "+token)
  221. resp, err := (&http.Client{}).Do(req)
  222. if err != nil {
  223. return err
  224. }
  225. defer resp.Body.Close()
  226. if resp.StatusCode != http.StatusNoContent {
  227. msg, err := io.ReadAll(resp.Body)
  228. if err != nil {
  229. return err
  230. }
  231. if !strings.ContainsAny(string(msg), "duplicated_authz_source_type") {
  232. return fmt.Errorf("error creating default EMQX ACL authorization mechanism %v", string(msg))
  233. }
  234. }
  235. return nil
  236. }
  237. // CreateDefaultAllowRule - creates a rule to deny access to all topics for all users by default
  238. // to allow user access to topics use the `mq.CreateUserAccessRule` function
  239. func (e *EmqxOnPrem) CreateDefaultAllowRule() error {
  240. token, err := getEmqxAuthToken()
  241. if err != nil {
  242. return err
  243. }
  244. payload, err := json.Marshal(&aclObject{Rules: []aclRule{{Topic: "#", Permission: "allow", Action: "all"}}})
  245. if err != nil {
  246. return err
  247. }
  248. req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authorization/sources/built_in_database/rules/all", bytes.NewReader(payload))
  249. if err != nil {
  250. return err
  251. }
  252. req.Header.Add("content-type", "application/json")
  253. req.Header.Add("authorization", "Bearer "+token)
  254. resp, err := (&http.Client{}).Do(req)
  255. if err != nil {
  256. return err
  257. }
  258. defer resp.Body.Close()
  259. if resp.StatusCode != http.StatusNoContent {
  260. msg, err := io.ReadAll(resp.Body)
  261. if err != nil {
  262. return err
  263. }
  264. return fmt.Errorf("error creating default ACL rules %v", string(msg))
  265. }
  266. return nil
  267. }